Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Blogs

91% of Cybersecurity Professionals Have Experienced Cyber Attacks that Use AI

A new report takes an exhaustive look at how cybersecurity professionals see the current and future state of attacks, and how well vendors are keeping up. The role of artificial intelligence (AI) in cyber attacks and cyber defenses can be pretty confusing.

Four Ways to Prevent Credential Theft and Credential-Based Attacks

When it comes to attack vectors, there are few as useful and widespread as credential theft. Verizon listed it as a top vector in their 2023 Data Breach Investigations Report, and Arctic Wolf Labs saw “historic compromise” as the root point of compromise for 7% of all breaches in 2022. According to IBM, stolen credentials accounted for 15% of breaches in 2022, and the average cost of a breach utilizing stolen credentials was $4.65 million.

Breaking Down the Differences Between Entry-Level, Mid, and Senior SOC Analysts

The Security Operations Center (SOC) plays a critical role in reducing cyber risk. Successful management of a SOC, however, is a team effort that requires the combined expertise of entry-level (tier 1), mid-level (tier 2), and senior-level (tier 3) analysts. In this piece, we break down the key differences of the three analyst tiers, offer tips for each tier, and provide universal advice to help you succeed in your SOC career.

Understanding Basics of Digital Personal Data Protection (DPDP)

India’s new Digital Personal Data Protection Act, 2023 (DPDP Act) was given assent by the President of India on August 11, 2023, marking a significant development in data protection legislation. This Act, which supersedes Section 43A of the IT Act, 2000 and the SPDI Rules, 2011, brings about considerable changes to the norms of data protection. The DPDP Act is lean and principle-based, with details around implementation to be set out in future rules.

NIST Cloud Security: Standards, Best Practices, & Benefits

Latest cloud security statistics reveal that 91% of all organizations have some portion of their IT environment hosted in cloud platforms. While cloud computing comes with many benefits, companies have trouble scaling up the security to meet the data and privacy challenges posed by it.

Making Content Security Policies (CSPs) easy with Page Shield

Modern web applications are complex, often loading JavaScript libraries from tens of different sources and submitting data to just as many. This leads to a vast attack surface area and many attack types that hackers may leverage to target the user browser directly. Magecart, a category of supply chain attack, is a good example.

Cybercrime Never Takes a Vacation. Cybersecurity in the Hospitality Industry

The Trustwave SpiderLabs team conducted a multi-month investigation into the cyber threats facing the hospitality industry worldwide and has released a detailed report displaying how threat actors conduct attacks, the methodologies used, and what organizations can do to protect themselves from specific types of attacks.

International Identity Day: an opportunity to pause and reflect

This blog is different from the ones you typically see from WatchGuard. It is because we are joining in the conversation about International Identity Day, which takes place on September 16, 2023. International ID Day is a movement to raise awareness and address the lack of identity, specifically the growing need for digital identities, as a fundamental right of people worldwide.

Ekran System Announces Integration with Venn to Enhance Remote Work Security

Ekran System announces its partnership with Venn, a provider of innovative solutions that secure remote work on any unmanaged or BYOD computer. Like Ekran System, Venn is recognized by many cybersecurity experts. It has also been named a Sample Vendor by Gartner. We hope this strategic partnership will mark a significant advancement in fortifying remote work environments against emerging cybersecurity threats.

Three Recent Examples of Why You Need to Know How Vulnerable Your Secrets Are

In today's digital landscape, the issue of compromised credentials has become a major concern. Discover how renowned companies like Microsoft, VMware, and Sourcegraph were recently confronted with the threats of secrets sprawling.